Most of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable. Fortunately, various lightweight encryption algorithms could be used to increase defense against various attacks to preserve the privacy and integrity of such applications. In this study, an overview of lightweight encryption algorithms, and methods, in addition, a modern technique for these algorithms also will be discussed. Besides, a survey for the algorithm that would use minimal power, require less time, and provide acceptable security to low-end IoT devices also introduced, Evaluating the results includes an evaluation of the algorithms reviewed and what was concluded from them. Through the review, we concluded that the best algorithms depend on the type of application used. For example, Lightweight block ciphers are one of the advanced ways to get around security flaws.
Breast cancer is a disease in which cells in the breast grow out of control. CD200 is a cell surface glycoprotein expressed on many cells, it belongs to the immunoglobulin family (Ig) and have a great role in the regulation of inflammation in autoimmunity. CD200 is the ligand for CD200R1 receptor. To determine if serum level of CD200 and its receptor CD200R1 can be used as a diagnostic and prognostic marker in patients with breast cancer.This case control study was carried out at Oncology Teaching Hospital – Medical city in Baghdad. Six groups were enrolled, four groups were confirmed with breast cancer stage (I, II, III and IV), fifth group (benign) and sixth group was control (healthy individual). Serum is divided to me
... Show MoreBackground: Repeated teenage pregnancy is a major burden on the healthcare system worldwide. Objective: We aimed to compare teenagers with their first and third pregnancies and to evaluate the likelihood of neonatal complications. Materials and Methods: This cross-sectional study was performed on female teenagers (aged ≤ 19 yr) with singleton pregnancies. The subjects (n = 298) were screened over 12 months. Ninety-six women were excluded, based on the exclusion criteria. The remaining subjects (n = 202) were divided into two groups: teenagers with first pregnancy (n = 96) and teenagers with third pregnancy (n = 47). The subjects were observed throughout pregnancy and delivery. The final sample size of the first and thi
... Show MoreAim: The reduction in the amount of marginal bone is the most important demand for the long term success of dental implants. This prospective clinical study was aimed to investigate the marginal bone loss of early loaded SLActive implants with different dimensions and surgical approaches. Materials and methods Fifteen patients aged from 18 to 60 years were divided into 2 groups (flapped and flapless approach) that underwent delayed implant placement protocol with SLActive implants. The marginal bone level was estimated by cone-beam computed tomography during three different periods: preoperatively, 8 weeks after surgery and 24 weeks after loading of the prosthesis. Results: The mean value of marginal bone level was not significantly chan
... Show MoreThis paper aims at the analytical level to know the security topics that were used with data journalism, and the expression methods used in the statements of the Security Media Cell, as well as to identify the means of clarification used in data journalism. About the Security Media Cell, and the methods preferred by the public in presenting press releases, especially determining the strength of the respondents' attitude towards the data issued by the Security Media Cell. On the Security Media Cell, while the field study included the distribution of a questionnaire to the public of Baghdad Governorate. The study reached several results, the most important of which is the interest of the security media cell in presenting its data in differ
... Show MoreIt is believed that Organizations around the world should be prepared for the transition to IPv6 and make sure they have the " know how" to be able to succeed in choosing the right migration to start time. This paper focuses on the transition to IPv6 mechanisms. Also, this paper proposes and tests a deployment of IPv6 prototype within the intranet of the University of Baghdad (BUniv) using virtualization software. Also, it deals with security issues, improvements and extensions of IPv6 network using firewalls, Virtual Private Network ( VPN), Access list ( ACLs). Finally, the performance of the obtainable intrusion detection model is assessed and compared with three approaches.
This paper performance for preparation and identification of six new complexes of a number of transition metals Cr (lII), Mn (I1), Fe (l), Co (II), Ni (I1), Cu (Il) with: N - (3,4,5-Trimethoxy phenyl-N - benzoyl Thiourea (TMPBT) as a bidentet ligand. The prepared complexes have been characterized, identified on the basis of elemental analysis (C.H.N), atomic absorption, molar conductivity, molar-ratio ,pH effect study, I. Rand UV spectra studies. The complexes have the structural formula ML2X3 for Cr (III), Fe (III), and ML2X2 for Mn (II), Ni (II), and MLX2 for Co (Il) , Cu (Il).
The research aims present to highlight the importance of creating construction Organizational appropriate to achieve strategic success and reduce many of the negative effects experienced by organizations has been developing his questionnaire especially so was distributed to a sample of workers in the Asia-cellular as sample included (60) responsive 0 and can embody intellectual dilemma following questions (What are the dimensions of the organizational infrastructure, and what are the justifications for carrying out the reform and development cleared the organizational structure to make it more flexible) to contribute to the achievement of the strategic requirements for success of the organization surveyed.
Find recommended a number o
The study aimed at identifying the strategic gaps in the actual reality of the management of public organizations investigated to determine the strategy used based on the study model. The study relied on the variable of the general organization strategy in its dimensions (the general organization strategy, the organization's political strategy and the defense strategy of the organization) The sample of the study was (General Directorate of Traffic, Civil Status Directorate and Civil Defense Directorate), formations affiliated to the Ministry of the Interior, for the importance of the activity carried out by these public organizations by providing them In order to translate the answers into a quantitative expression in the analysi
... Show MoreHomomorphic encryption became popular and powerful cryptographic primitive for various cloud computing applications. In the recent decades several developments has been made. Few schemes based on coding theory have been proposed but none of them support unlimited operations with security. We propose a modified Reed-Muller Code based symmetric key fully homomorphic encryption to improve its security by using message expansion technique. Message expansion with prepended random fixed length string provides one-to-many mapping between message and codeword, thus one-to many mapping between plaintext and ciphertext. The proposed scheme supports both (MOD 2) additive and multiplication operations unlimitedly. We make an effort to prove
... Show More